We performed experiments to investigate how humans acquire an internal representation of virtual objects through the execution of reaching movements across the object surface. Sub...
Vikram S. Chib, James L. Patton, Kevin M. Lynch, F...
This report analyzes two popular heuristics for ensuring packet integrity in ATM switching systems. In particular, we analyze the behavior of packet tail discarding, in order to u...
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
This paper introduces a graph-partitioning generic methodology for developing deadlock-free wormhole routing in an arbitrary network. Further extension allows partial cyclic depen...
This paper presents a new distributed disk-array architecture for achieving high I/O performance in scalable cluster computing. In a serverless cluster of computers, all distribute...